Skip to content

Commit 98d5f83

Browse files
authored
Merge pull request #50453 from Srivaralakshmi/SBO-RN-1-2
Document Release notes for SBO 1.2
2 parents c41f02a + 85f6e4c commit 98d5f83

File tree

2 files changed

+68
-9
lines changed

2 files changed

+68
-9
lines changed

applications/connecting_applications_to_services/sbo-release-notes.adoc

Lines changed: 4 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -20,19 +20,12 @@ With {servicebinding-title}, you can:
2020
The custom resource definition (CRD) of the {servicebinding-title} supports the following APIs:
2121

2222
* *Service Binding* with the `binding.operators.coreos.com` API group.
23-
* *Service Binding (Spec API Tech Preview)* with the `servicebinding.io` API group.
24-
+
25-
[IMPORTANT]
26-
====
27-
*Service Binding (Spec API Tech Preview)* with the `servicebinding.io` API group is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.
28-
29-
For more information about the support scope of Red Hat Technology Preview features, see https://access.redhat.com/support/offerings/techpreview/.
30-
====
23+
* *Service Binding (Spec API)* with the `servicebinding.io` API group.
3124
3225
[id="support-matrix"]
3326
== Support matrix
3427

35-
Some features in this release are currently in link:https://access.redhat.com/support/offerings/techpreview[Technology Preview]. These experimental features are not intended for production use.
28+
Some features in the following table are in link:https://access.redhat.com/support/offerings/techpreview[Technology Preview]. These experimental features are not intended for production use.
3629

3730
In the table, features are marked with the following statuses:
3831

@@ -48,6 +41,7 @@ Note the following scope of support on the Red Hat Customer Portal for these fea
4841
|*{servicebinding-title}* 2+|*API Group and Support Status*|*OpenShift Versions*
4942

5043
|*Version*|*`binding.operators.coreos.com`* |*`servicebinding.io`* |
44+
|1.2 |GA |GA |4.7-4.11
5145
|1.1.1 |GA |TP |4.7-4.10
5246
|1.1 |GA |TP |4.7-4.10
5347
|1.0.1 |GA |TP |4.7-4.9
@@ -61,6 +55,7 @@ Note the following scope of support on the Red Hat Customer Portal for these fea
6155
Red Hat is committed to replacing problematic language in our code, documentation, and web properties. We are beginning with these four terms: master, slave, blacklist, and whitelist. Because of the enormity of this endeavor, these changes will be implemented gradually over several upcoming releases. For more details, see link:https://www.redhat.com/en/blog/making-open-source-more-inclusive-eradicating-problematic-language[Red Hat CTO Chris Wright's message].
6256

6357
// Modules included, most to least recent
58+
include::modules/sbo-release-notes-1-2.adoc[leveloffset=+1]
6459
include::modules/sbo-release-notes-1-1-1.adoc[leveloffset=+1]
6560
include::modules/sbo-release-notes-1-1.adoc[leveloffset=+1]
6661
include::modules/sbo-release-notes-1-0-1.adoc[leveloffset=+1]

modules/sbo-release-notes-1-2.adoc

Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
[id="sbo-release-notes-1-2_{context}"]
2+
// Module included in the following assembly:
3+
//
4+
// * applications/connecting_applications_to_services/sbo-release-notes.adoc
5+
:_content-type: REFERENCE
6+
= Release notes for {servicebinding-title} 1.2
7+
8+
{servicebinding-title} 1.2 is now available on {product-title} 4.7, 4.8, 4.9, 4.10, and 4.11.
9+
10+
[id="new-features-1-2_{context}"]
11+
== New features
12+
This section highlights what is new in {servicebinding-title} 1.2:
13+
14+
* Enable {servicebinding-title} to consider optional fields in the annotations by setting the `optional` flag value to `true`.
15+
* Support for `servicebinding.io/v1beta1` resources.
16+
* Improvements to the discoverability of bindable services by exposing the relevant binding secret without requiring a workload to be present.
17+
18+
[id="known-issues-1-2_{context}"]
19+
== Known issues
20+
* Currently, when you install {servicebinding-title} on {product-title} 4.11, the memory footprint of {servicebinding-title} increases beyond expected limits. With low usage, however, the memory footprint stays within the expected ranges of your environment or scenarios. In comparison with {product-title} 4.10, under stress, both the average and maximum memory footprint increase considerably. This issue is evident in the previous versions of {servicebinding-title} as well. There is currently no workaround for this issue. link:https://issues.redhat.com/browse/APPSVC-1200[APPSVC-1200]
21+
22+
* By default, the projected files get their permissions set to 0644. {servicebinding-title} cannot set specific permissions due to a bug in Kubernetes that causes issues if the service expects specific permissions such as, `0600`. As a workaround, you can modify the code of the program or the application that is running inside a workload resource to copy the file to the `/tmp` directory and set the appropriate permissions. link:https://issues.redhat.com/browse/APPSVC-1127[APPSVC-1127]
23+
24+
* There is currently a known issue with installing {servicebinding-title} in a single namespace installation mode. The absence of an appropriate namespace-scoped role-based access control (RBAC) rule prevents the successful binding of an application to a few known Operator-backed services that the {servicebinding-title} can automatically detect and bind to. When this happens, it generates an error message similar to the following example:
25+
+
26+
.Example error message
27+
[source,text]
28+
----
29+
`postgresclusters.postgres-operator.crunchydata.com "hippo" is forbidden:
30+
User "system:serviceaccount:my-petclinic:service-binding-operator" cannot
31+
get resource "postgresclusters" in API group "postgres-operator.crunchydata.com"
32+
in the namespace "my-petclinic"`
33+
----
34+
+
35+
Workaround 1: Install the {servicebinding-title} in the `all namespaces` installation mode. As a result, the appropriate cluster-scoped RBAC rule now exists and the binding succeeds.
36+
+
37+
Workaround 2: If you cannot install the {servicebinding-title} in the `all namespaces` installation mode, install the following role binding into the namespace where the {servicebinding-title} is installed:
38+
+
39+
.Example: Role binding for Crunchy Postgres Operator
40+
[source,yaml]
41+
----
42+
kind: RoleBinding
43+
apiVersion: rbac.authorization.k8s.io/v1
44+
metadata:
45+
name: service-binding-crunchy-postgres-viewer
46+
subjects:
47+
- kind: ServiceAccount
48+
name: service-binding-operator
49+
roleRef:
50+
apiGroup: rbac.authorization.k8s.io
51+
kind: ClusterRole
52+
name: service-binding-crunchy-postgres-viewer-role
53+
----
54+
link:https://issues.redhat.com/browse/APPSVC-1062[APPSVC-1062]
55+
56+
* According to the specification, when you change the `ClusterWorkloadResourceMapping` resources, {servicebinding-title} must use the previous version of the `ClusterWorkloadResourceMapping` resource to remove the binding data that was being projected until now. Currently, when you change the `ClusterWorkloadResourceMapping` resources, the {servicebinding-title} uses the latest version of the `ClusterWorkloadResourceMapping` resource to remove the binding data. As a result, {the servicebinding-title} might remove the binding data incorrectly. As a workaround, perform the following steps:
57+
+
58+
--
59+
. Delete any `ServiceBinding` resources that use the corresponding `ClusterWorkloadResourceMapping` resource.
60+
. Modify the `ClusterWorkloadResourceMapping` resource.
61+
. Re-apply the `ServiceBinding` resources that you previously removed in step 1.
62+
--
63+
+
64+
link:https://issues.redhat.com/browse/APPSVC-1102[APPSVC-1102]

0 commit comments

Comments
 (0)